Home > Articles > Software Development & Management

Networking Hardware

In this chapter, author Joe Habraken discusses the hardware that's involved in networking. This chapter concentrates on the connectivity devices that define the network topology-the most important being the network interface card. Habraken also explores the issues related to buying client and server hardware, and takes a look at hubs, routers, and switches.
This sample chapter is excerpted from Absolute Beginner's Guide to Networking, 3rd Edition.

In this chapter

  • Working with network interface cards

  • Selecting and installing a NIC

  • Using hubs

  • Working with PC motherboards

  • Understanding processors and PC RAM

  • Working with hard drives

  • Differentiating server and client hardware


  • Our Age of Anxiety is, in great part, the result of trying to do today's jobs with yesterday's tools.

    –Marshall McLuhan

Now that we've discussed the different kinds of networks and looked at network topologies, we should spend some time discussing the hardware involved in networking. This chapter will concentrate on the connectivity devices that define the network topology—the most important being the network interface card. We will also take a look at hubs, routers, and switches.

Another important aspect of building your network is selecting the hardware for your client PCs and your network servers. There are many good primers on computer hardware—for example, the Absolute Beginner's Guide to PC Upgrades, published by Que. Also, numerous advanced books, such as Upgrading and Repairing PCs (by Scott Mueller, also from Que), are available, so we won't cover PC hardware in depth in this chapter. We will take a look at motherboards, RAM, and hard drives because of the impact these components have on server performance. We will also explore some of the issues related to buying client and server hardware.

Let's start our discussion with the network interface card. We can then look at network connectivity devices and finish up with some information on PC hardware.

Working with Network Interface Cards

As far as networking is concerned, the network interface card (NIC) is one of the most important PC devices. Each computer on the network (including servers and clients) requires one, and it is the NIC that provides the connection between the PC and the network's physical medium (such as copper or fiber-optic cable, both of which are discussed in the next chapter).

An IBM PC (or compatible PC) typically requires that a NIC be added to it (unless you buy your network clients and servers with a NIC as their standard hardware configuration). Even Macintoshes and Apple PowerPCs require NICs. In most cases, newer Apple computers, such as the iMac, have built-in Ethernet NICs. Figure 3.1 shows a PCI NIC from 3Com, which provides the RJ-45 female port for the CAT 5 twisted pair that connects the computer to a hub or switch (more about these connectivity devices later in the chapter).

Not only does the NIC provide the computer with a connection to the network, but it also handles an important data-conversion function. Data travels in parallel on the PC's bus system; the network medium demands a serial transmission. The transceiver (a transmitter and receiver) on the NIC card is able to move data from parallel to serial, and vice versa. This is not unlike automobiles moving on a multi-lane superhighway that must all merge into one lane of traffic.

Figure 3.1 Network interface cards provide the connection between the PC and the network cabling.

Network interface cards also supply the basic addressing system used to get data from one computer to another on the network. This hardware or MAC address is burned into a ROM chip on the NIC. It is referred to as the MAC address because the Media Access Control (MAC) layer is actually a sublayer of the OSI model's Data Link layer (the OSI model is discussed in detail in Chapter 5, "Network Protocols: Real and Imagined," in the section "Understanding the OSI Model").

TIP

The hardware address on the NIC actually provides the definitive address for a computer on the network. Different protocol stacks, such as TCP/IP, use a logical addressing system (in the case of TCP/IP, it is IP addresses). In this case, the logical address must be resolved to the NIC's hardware address before the data can actually be received.

Selecting a NIC

NICs come in different types, depending on the network architecture being used on the network (such as Ethernet or token ring, which are both discussed in the next chapter). NICs also differ in the type of motherboard slot they fit into. PCI NICs fit into a PCI slot on a motherboard. ISA NICs fit into an ISA slot. Figure 3.1 shows a PCI card (PCI cards are shorter than ISA cards, as are their respective slots on the motherboard).

When you select a NIC, it needs to be compatible with the architecture of the network. The Ethernet network is, by far, the most common network architecture type and is used for both peer-to-peer networks and large-scale corporate networks. Ethernet connectivity devices, such as hubs, are also much cheaper than the connectivity devices deployed on a token-ring network.

NOTE

Token-ring networks are typically found in larger corporations. The token-ring architecture does offer some advantages over Ethernet (particularly on high-traffic networks, where bandwidth is at a premium), which we discuss in the next chapter.

The NIC that you select must also fit in an empty expansion slot on your computer's motherboard. On an IBM or compatible PC, you have a number of choices, such as an ISA, PCI, or EISA slot. The slots available will depend on the motherboard (motherboards are discussed later in the chapter). Figure 3.2 shows a motherboard that provides both ISA and PCI expansion slots.

Figure 3.2 Your motherboard will typically provide ISA and PCI expansion slots.

The Industry Standard Architecture (ISA) bus (a bus is the internal wiring system on the motherboard) was the standard used on the IBM PC and the IBM XT class of personal computers. This slot type supported 8-bit throughput for expansion devices. The ISA bus speed was increased to 16 bits in 1984. A large number of devices, such as modems, sound cards, and NICs, are available for this bus type. Even some new motherboards provide ISA slots. However, a day will come when the ISA slot is considered obsolete and only the higher-throughput PCI slots will be available on motherboards.

The PCI bus, on the other hand, was introduced by Intel in 1993 and has really become the industry standard. PCI provides a 32-bit bus, and PCI version 2.1 supports 64-bit and faster bus specifications. As with ISA, PCI cards support a large number of peripheral devices.

NOTE

There is a slight chance you might run into three other computer bus architectures: EISA, VESA, and MCA. Extended Industry Standard Architecture (EISA) was developed by Compaq and other PC clone manufacturers as a suggested PC slot standard (it never became the industry standard) when IBM rolled out PCs embracing Micro Channel Architecture (which is now nothing more than a footnote in bus architecture literature). EISA provided 32-bit bus throughput as well as ISA compatibility. The Video Electronics Standards Association (VESA) bus provided support for 486 processors. This 32-bit bus system has been abandoned by motherboard manufacturers in favor of the PCI bus. Micro Channel Architecture (MCA) was a new bus system launched by IBM for its PS/2 family of computers. MCA was not compatible with ISA, and the availability of MCA peripherals was limited when the PS/2 family was first introduced. MCA expansion cards were also extremely expensive. The MCA bus was eventually abandoned by IBM in favor of the PCI bus.

Although ISA NICs are generally going to be cheaper than PCI NICs, PCI NICs are obviously going to provide better overall performance because of their potential for faster throughput. You can get some other enhancements with a NIC that improve the transfer of data from the NIC to the computer's processor:

  • Buffering. Memory chips are actually placed on the NIC. This RAM is used as a buffer. It can hold data that is awaiting services provided by the computer's processor. It can also hold data waiting to be broadcast out onto the LAN medium.

  • Direct Memory Access (DMA). Computers that support DMA allow devices such as network interface cards to transfer and accept data directly from the computer's RAM. This means that the processor does not have to become involved in the process of moving data to or from the NIC and RAM.

  • Bus mastering. NICs can be designed to directly access computer RAM without using the computer's processor as an intermediary. Bus mastering (which is similar to DMA) allows the NIC to control the bus and send and receive data to and from the computer's RAM.

NICs that provide buffering and support DMA or bus mastering are going to be more expensive than NICs that do not. However, when selecting a NIC for a mission-critical server, you will probably want to buy one with all the performance bells and whistles.

Installing a NIC

You certainly don't need an engineering degree to install a network card in a PC. However, before you tackle the job, you need to be aware of one thing: You need to have a handle on a subject area that an old colleague of mine referred to as "static awareness." Static electricity can actually produce enough voltage to ruin a motherboard or expansion card, such as a NIC. This means that you should use some sort of antistatic wristband that attaches to the PC case or do your work while standing on an antistatic mat. The bottom line is that you should avoid working on the computer in a room that is carpeted.

You will also want to be sure you have a couple of decent screw drivers. These screw drivers should not have magnetized tips. Now, here are the steps to follow:

  1. Open up the case on the computer and install the NIC in an open expansion slot.

  2. Close up the case and attach the network medium (typically twisted-pair cabling).

  3. Boot up the computer. If you purchased a plug-and-play network card and are using an OS that supports plug-and-play technology, the most you will have to do is provide a disk or CD-ROM that contains the driver for the NIC.

  4. If you are using an operating system that does not detect new hardware devices, you will have to manually install the NIC. If the card came with installation software, use that software to install the necessary drivers.

Because most new computers and the operating systems that they run embrace plug-and-play technology, installing a NIC in a computer is really just a matter of placing the NIC in an empty motherboard slot and then restarting the computer. Plug-and-play NICs will be recognized by the operating system and the appropriate software driver will be loaded on the system. Figure 3.3 shows the Windows 2000 Professional OS identifying a plug-and-play NIC.

Figure 3.3 Operating systems that embrace plug-and-play technology make it easy to add a plug-and-play NIC to the system.

Not all operating systems embrace plug-and-play technology, however, and these types of operating systems will require that you select an IRQ (or Interrupt Request) for the new NIC. Each device in your computer, including the mouse, keyboard, and NIC, is assigned an Interrupt Request line that the device uses to alert the microprocessor (CPU) that it needs data processed. Each device must be assigned a unique IRQ; otherwise, you will have an IRQ conflict. Although PCI motherboards do allow devices to share an IRQ, common practice is to have a unique IRQ for every device on the system.

Finding the available IRQs is not that difficult, and each operating system (including PC operating systems and network operating systems) provides you with a tool to view the used and available IRQs on the system. For example, Figure 3.4 shows the Windows 2000 Device Manager, which displays the IRQs on the system.

NOTE

If you are using Windows 2000 Server, getting to the Device Manager is very straightforward. Right-click the My Computer icon on the desktop and then choose Properties. In the Properties dialog box, select the Hardware tab. Then click the Device Manager button.

Figure 3.4 An operating system provides a utility that allows you to examine the IRQ configuration of a system.

Table 3.1 shows the standard IRQ settings for a PC. As you can see, a number of the IRQs are reserved for particular system devices.

Table 3.1 IRQ Settings

IRQ

Use

0

System timer

1

Keyboard

2

Cascade to secondary IRQ controller

3

COM port 2 and 4 (serial port)

4

COM port 1 and 3 (serial port)

5

LPT2 (printer port)

6

Floppy disk controller

7

LPT1 (printer port)

8

Real-time clock

9

Free

10

Primary SCSI adapter (or free)

11

Secondary SCSI adapter (or free)

12

PS/2 mouse

13

Floating-point math coprocessor

14

Primary hard disk controller

15

Secondary hard disk controller (or free)


Obviously, in cases where the computer does not have a second COM port or an LTP2 port, these IRQs will be available. Each computer's hardware configuration will vary, so you will have to determine the available IRQs for each computer in which you are installing a NIC.

TIP

Most operating systems do a pretty good job of helping you get a newly installed NIC up and running. Windows 2000 Server and Windows 2000 Professional both embrace Microsoft's Plug and Play scheme for plug-and-play hardware devices. This means that both of these operating systems will, in most cases, identify and install the appropriate drivers for a number of the network interface cards available on the market. And although you can't call what they do "plug and play," Novell NetWare 5, Sun Microsystems Solaris OS, and the various Linux clones do a pretty good job of helping you set up the appropriate network card in your network server or client machines.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020